Assist reverse tcp shells in post-exploration tasks
☆221Oct 17, 2025Updated 5 months ago
Alternatives and similar repositories for redpill
Users that are interested in redpill are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C2 Powershell Command & Control Framework with BuiltIn Commands☆505Mar 11, 2024Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- c++ fully undetected shellcode launcher ;)☆980Jun 11, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆180Apr 25, 2020Updated 5 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,577Nov 9, 2021Updated 4 years ago
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆765Jul 6, 2021Updated 4 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆469Dec 13, 2021Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Python AV Evasion Tools☆519Oct 14, 2025Updated 5 months ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated last week
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- ☆336May 29, 2023Updated 2 years ago
- Open source C2 server created for stealth red team operations☆837Sep 26, 2022Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆817Jan 20, 2023Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 4 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Cobalt Strike kit for Persistence☆493Jan 27, 2020Updated 6 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago